hexploitable - Overview

View hexploitable's full-sized avatar

Block or report hexploitable

Hi there 👋

GitHub Gitlab Twitter LinkedIn

I'm Hex, and I run Reconditorium, a security consultancy.

  • 🔭   I specialise in mobile security 📱 - particularly static & dynamic analysis
  • 💬   Feel free to ask me about mobile security, RASP, MDM, Frida, Reverse Engineering, etc.
  • 📫   Reach out at: gh@hexplo.it or @Hexploitable

Popular repositories Loading

  1. A memory scanning tool which uses mach_vm* to either dump memory or look for a specific sequence of bytes.

    Objective-C++ 93 24

  2. This repository houses the materials, slides and exercises from the r2con 2020 walkthrough sessions.

    JavaScript 38 8

  3. A collection of custom scripts for use with Hopper disassembler

    Python 24 5

  4. Forked from stefanesser/dumpdecrypted

    Dumps decrypted mach-o files from encrypted iPhone applications from memory to disk. This tool is necessary for security researchers to be able to look under the hood of encryption.

    C 3

  5. A frida module for monitoring and tampering of supervisor calls on arm64 iOS

    2